{"title":"商态和概率通道","authors":"I. S. Moskowitz","doi":"10.1109/CSFW.1990.128187","DOIUrl":null,"url":null,"abstract":"Restrictiveness is interpreted in terms of a quotient set of the states of a machine. Consideration is given to how restrictiveness can still allow certain probabilistic effects to open up a communication channel between high and low users of a computer system. Specifically, assigning probabilities to transitions in order to look for simple probabilistic channels is examined. The theory is then extended to deal with extended transitions. How Shannon's work on information theory can be used to analyze a system that is restrictive but nonetheless has a probabilistic channel is discussed.<<ETX>>","PeriodicalId":185508,"journal":{"name":"[1990] Proceedings. The Computer Security Foundations Workshop III","volume":"11 1","pages":"0"},"PeriodicalIF":0.0000,"publicationDate":"1990-06-12","publicationTypes":"Journal Article","fieldsOfStudy":null,"isOpenAccess":false,"openAccessPdf":"","citationCount":"10","resultStr":"{\"title\":\"Quotient states and probabilistic channels\",\"authors\":\"I. S. Moskowitz\",\"doi\":\"10.1109/CSFW.1990.128187\",\"DOIUrl\":null,\"url\":null,\"abstract\":\"Restrictiveness is interpreted in terms of a quotient set of the states of a machine. Consideration is given to how restrictiveness can still allow certain probabilistic effects to open up a communication channel between high and low users of a computer system. Specifically, assigning probabilities to transitions in order to look for simple probabilistic channels is examined. The theory is then extended to deal with extended transitions. How Shannon's work on information theory can be used to analyze a system that is restrictive but nonetheless has a probabilistic channel is discussed.<<ETX>>\",\"PeriodicalId\":185508,\"journal\":{\"name\":\"[1990] Proceedings. The Computer Security Foundations Workshop III\",\"volume\":\"11 1\",\"pages\":\"0\"},\"PeriodicalIF\":0.0000,\"publicationDate\":\"1990-06-12\",\"publicationTypes\":\"Journal Article\",\"fieldsOfStudy\":null,\"isOpenAccess\":false,\"openAccessPdf\":\"\",\"citationCount\":\"10\",\"resultStr\":null,\"platform\":\"Semanticscholar\",\"paperid\":null,\"PeriodicalName\":\"[1990] Proceedings. The Computer Security Foundations Workshop III\",\"FirstCategoryId\":\"1085\",\"ListUrlMain\":\"https://doi.org/10.1109/CSFW.1990.128187\",\"RegionNum\":0,\"RegionCategory\":null,\"ArticlePicture\":[],\"TitleCN\":null,\"AbstractTextCN\":null,\"PMCID\":null,\"EPubDate\":\"\",\"PubModel\":\"\",\"JCR\":\"\",\"JCRName\":\"\",\"Score\":null,\"Total\":0}","platform":"Semanticscholar","paperid":null,"PeriodicalName":"[1990] Proceedings. The Computer Security Foundations Workshop III","FirstCategoryId":"1085","ListUrlMain":"https://doi.org/10.1109/CSFW.1990.128187","RegionNum":0,"RegionCategory":null,"ArticlePicture":[],"TitleCN":null,"AbstractTextCN":null,"PMCID":null,"EPubDate":"","PubModel":"","JCR":"","JCRName":"","Score":null,"Total":0}
Restrictiveness is interpreted in terms of a quotient set of the states of a machine. Consideration is given to how restrictiveness can still allow certain probabilistic effects to open up a communication channel between high and low users of a computer system. Specifically, assigning probabilities to transitions in order to look for simple probabilistic channels is examined. The theory is then extended to deal with extended transitions. How Shannon's work on information theory can be used to analyze a system that is restrictive but nonetheless has a probabilistic channel is discussed.<>